To protect data and systems at IU, the HPS group may place limits or restrictions on technology services provided on or from any HPS-owned or -managed system and network, as follows:

Limitations may be implemented through the use of policies, standards, and/or technical methods, and could include (but may not be limited to) usage eligibility rules, passphrase requirements, or restrictions against using certain protocols applications known to cause security problems.

Restrictions may be deployed permanently, based on continuing threat or risk, after appropriate consultation with affected constituents, or deployed temporarily, without prior coordination, in response to an immediate and serious threat.

Restrictions deployed temporarily will be removed when the risk is mitigated to an acceptable level, or if the restrictions have an effect on university functions that approaches or exceeds the risk associated with the threat, as negotiated between the affected constituents and HPS administrators.

Passphrases

You authenticate on the IU research systems with your IU passphrase. Each passphrase is intended for the owner of the account only; do not share your passphrase with others. If your passphrase is determined to be insecure, your account will be disabled until you reset your passphrase.

UITS will not give out account passphrases for the research systems in email or by telephone. If you've forgotten your passphrase, see Reset your IU passphrase.

Login and file transfer access

Login and file transfer access are limited to the designated interactive nodes via clients and commands that use the SSH protocol version 2 (SSH2). For security reasons, the Telnet and FTP protocols are no longer supported. For information about transferring files to and from the Scholarly Data Archive (SDA), see At IU, how do I access the SDA?

Software requests

If you want to use public-domain or commercial packages on the research systems, you can request their installation on publicly accessible disk space:

Restrictions

Unattended listening user services (e.g., programs that open a socket waiting for a connection from another host) will be terminated.

Accounts not logged into within 30 days of creation will be disabled.

Accounts not used for a period of six months will be disabled.

Acknowledging grant support

The Indiana University cyberinfrastructure managed by the Research Technologies division of UITS is supported by funding from several grants, each of which requires you to acknowledge its support in all presentations and published works stemming from research it has helped to fund. Conscientious acknowledgment of support from past grants also enhances the chances of IU's research community securing funding from grants in the future. For the acknowledgment statement(s) required for scholarly printed works, web pages, talks, online publications, and other presentations that make use of grant-funded research systems at IU, see If I use IU's research cyberinfrastructure, what sources of funding do I need to acknowledge in my published work?

Questions and comments

The policies described in this document were established with the
goal of providing a stable, powerful, and efficient research computing
environment for IU faculty, graduate students, and staff. If you have
any questions or comments about these policies, UITS welcomes your
input. Please contact High
Performance Systems.